AUTHOR ARCHIVES

Heather Greenfield

January 22, 2008
Two technology trade associations are taking steps to consolidate their membership rolls, programs and offices after a merger was approved by their boards of directors. The boards of the Information Technology Association of America and the Government Electronics and Information Technology Association approved the merger Friday afternoon after months of...

January 15, 2008
Scientists at national laboratories will be critical to post-Cold War national security solutions, but they need a clearer vision and financial commitment from the government, according to the director of the Los Alamos National Laboratory. Lab Director Michael Anastasio spoke Tuesday to scientists and reporters at the Woodrow Wilson Center...

January 11, 2008
Some people are hoping the new year brings a new level of agreement on encryption standards used by federal agencies. Vendors are awaiting a request for proposals from the Homeland Security Department on encryption standards. Encryption is seen by many as a way federal agencies can better protect sensitive data,...

January 8, 2008
While new transparency rules passed by Congress nearly a year ago make it easier than ever to track earmarks in the budget bills Congress passed before leaving town last month, they didn't end the practice. The numbers show $939 million in research and development earmarks in the fiscal 2008 omnibus...

December 3, 2007
To highlight the problems that high--tech workers face getting green cards, all members of Congress now have "blue cards." The Compete America coalition has been distributing the cards to lawmakers during meetings, one of several industry lobbying efforts on competitiveness issues in the last few weeks of the year. On...

November 29, 2007
The final rules for stricter driver's licensing standards are being reviewed by the Office of Management and Budget and are not due to go public until March. But the director of the so-called REAL ID program at the Department of Homeland Security offered a few hints on the timetable Thursday...

November 20, 2007
Information technology workers and managers in the public sector place a slightly higher priority on switching to environmentally friendly data centers than the private sector but face more obstacles taking action, according to a new survey. The online survey by Symantec also found that government managers have more knowledge of...

October 30, 2007
Government chief information security officers offered examples of emerging security threats they most worry about during an Information Technology Association of America security workshop Tuesday. Patrick Howard, CISO for the Housing and Urban Development Department, said as more improvements are made to secure the perimeters of systems, he worries about...

October 29, 2007
President Bush's science adviser has issued an explanation of how and why his office edited testimony about climate change and public health that the Centers for Disease Control and Prevention was prepared to deliver to a Senate subcommittee last week. The explanation to the media comes before Monday evening's deadline...

October 1, 2007
A survey released Monday to mark cyber-security awareness month in October shows that consumers are aware of security risks online, but there is a big gap in what they have done versus what they think they have done to protect themselves. A McAfee survey found that 93 percent of people...

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.